Showing 141-150 from 239
...blocking processes that are attempting to track your online activity. Whenever you visit a website, PrivDog will display the number of privacy threats it has blocked in the top-right corner of your browser. Clicking the PrivDog icon will reveal a more detailed breakdown of the types of threats it has stopped, which can include advertising networks, 3rd party trackers...
http://help.comodo.com/topic-72-1-522-6228-CIS-Premium-–-Installation.html...blocking processes that are attempting to track your online activity. Whenever you visit a website, PrivDog will display the number of privacy threats it has blocked in the top-right corner of your browser. Clicking the PrivDog icon will reveal a more detailed breakdown of the types of threats it has stopped, which can include advertising networks, 3rd party trackers...
http://help.comodo.com/topic-72-1-451-4689-CIS-Premium-–-Installation.html...blocking processes that are attempting to track your online activity. Whenever you visit a website, PrivDog will display the number of privacy threats it has blocked in the top-right corner of your browser. Clicking the PrivDog icon will reveal a more detailed breakdown of the types of threats it has stopped, which can include advertising networks, 3rd party trackers...
http://help.comodo.com/topic-72-1-451-4690-CIS-Pro---Installation-and-Activation.html...blocking processes that are attempting to track your online activity. Whenever you visit a website, PrivDog will display the number of privacy threats it has blocked in the top-right corner of your browser. Clicking the PrivDog icon will reveal a more detailed breakdown of the types of threats it has stopped, which can include advertising networks, 3rd party trackers...
http://help.comodo.com/topic-72-1-451-4691-CIS-Complete---Installation-and-Activation.html...block downloads of specific types of file. Example scenarios: Some malicious websites try to push downloads of malware in .exe file format. .exe files are programs which can execute commands on your server. If the .exe is malicious in intent then these commands could include the installation of key logging programs, initiation of buffer overflow attacks or code to turn...
http://help.comodo.com/topic-213-1-517-6062-Blocking-any-Downloads-of-a-Specific-File-Type.html...block downloads of specific types of file. Example scenarios: Some malicious websites try to push downloads of malware in .exe file format. .exe files are programs which can execute commands on your computer. If the .exe is malicious in intent then these commands could include the installation of key logging programs, initiation of buffer overflow attacks or code to turn...
http://help.comodo.com/topic-72-1-451-4811-Blocking-Any-Downloads-of-a-Specific-File-Type.html...block downloads of specific types of file. Example scenarios: Some malicious websites try to push downloads of malware in .exe file format. .exe files are programs which can execute commands on your computer. If the .exe is malicious in intent then these commands could include the installation of key logging programs, initiation of buffer overflow attacks or code to turn...
http://help.comodo.com/topic-72-1-623-7665-Block-Any-Downloads-of-a-Specific-File-Type.html...block downloads of specific types of file. Example scenarios: Some malicious websites try to push downloads of malware in .exe file format. .exe files are programs which can execute commands on your computer. If the .exe is malicious in intent then these commands could include the installation of key logging programs, initiation of buffer overflow attacks or code to turn...
http://help.comodo.com/topic-72-1-522-6358-Block-Any-Downloads-of-a-Specific-File-Type.html...block downloads of specific types of file. Example scenarios: Some malicious websites try to push downloads of malware in .exe file format. .exe files are programs which can execute commands on your computer. If the .exe is malicious in intent then these commands could include the installation of key logging programs, initiation of buffer overflow attacks or code to turn...
http://help.comodo.com/topic-72-1-284-3070-Blocking-Any-Downloads-of-a-Specific-File-Type.html...websites that are new and are not yet assigned to a category in the central web categories database. Select ' Allow Unclassified Traffic' to enable. Content Filtering: Policies are configured to allow or block access to particular categories. A category is a list of websites that are grouped together based on their dominant content. For example, Education, Alcohol, Finance and so on. See Category...
http://help.comodo.com/topic-1400010-1-1400013-1400507-Edit-your-Global-Default-Policy.html